• Title/Summary/Keyword: Risk Sharing

Search Result 295, Processing Time 0.036 seconds

A Study on the Determinants of Goodwill's Road shop (상가권리금의 결정요인에 관한 연구)

  • Lim, Jae-Hyon;Jeong, Seung-Young
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.2
    • /
    • pp.191-201
    • /
    • 2015
  • There has been few researches on the variables that influence on goodwill of the store. The purpose of this study is to identify the determined variables which affect goodwill of the store in seoul empirically by examining the interaction between goodwill and risk sharing in the commercial lease contract. We have analyzed 1,463 retail unite of goodwill over August, 2015. A regression analysis model is constructed to test the significance of the variables on the goodwill per $m^2$ in Seoul. The results indicate that rent to total start-up cost of ratio and retail property characteristics variables explain a significant portion of the variability of goodwill. The results suggest that retail rents is comparatively more important than size of store. The study suggests that monthly rents to total start-up cost of ratio is the key variable affecting the goodwill of the store.

Polymorphic Lengths of Dinucleotide $(GT)^n$ Repeats in Upstream of Human nNOS Exon 1f Gene Play a Role in Modulating the nNOS Transcription: Clinical Implications

  • Shin, Mi-Kyung;Kim, Kyung-Nam;Kim, Chul-Eung;Lee, Sung-Keun;Kang, Ju-Hee;Park, Chang-Shin
    • Molecular & Cellular Toxicology
    • /
    • v.4 no.1
    • /
    • pp.11-15
    • /
    • 2008
  • The expression of neuronal nitric oxide synthase (nNOS) is regulated by various spliced first exons (exon 1a-1i), sharing differentially common exon 2 in diverse human tissues. The highly complex structure and regulation of human nNOS gene gave limitations of information for the precise mechanism of nNOS regulation. In the present study, we report that the repeats of polymorphic dinucleotides $(GT)^nA(TG)^n$ repeats located in just upstream to the exon 1f in human nNOS gene play suppressive role in transcription, as shown in the characteristics of Z-DNA motif in other genes. In neuronal and trophoblast cells transfected transiently with luciferase construct without dinucleotide repeats at the 5'-flanking region of exon 1f in nNOS gene, the luciferase activity was increased markedly. However, the presence of the dinucleotide repeats dramatically suppressed the luciferase activity to the basal level, and which was dependent on the length of $(GT)^n$ and $(TG)^n$ repeats. More importantly, we found the polymorphisms in the length of dinucleotide repeats in human. Furthermore, we show for the first time here that there is a significant association of the lengths of polymorphic dinucleotide $(GT)^n$ and $(TG)^n$ repeats with the risk of schizophrenia.

Using the SIEM Software vulnerability detection model proposed (SIEM을 이용한 소프트웨어 취약점 탐지 모델 제안)

  • Jeon, In-seok;Han, Keun-hee;Kim, Dong-won;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.961-974
    • /
    • 2015
  • With the advancement of SIEM from ESM, it allows deep correlated analysis using huge amount of data. By collecting software's vulnerabilities from assessment with certain classification measures (e.g., CWE), it can improve detection rate effectively, and respond to software's vulnerabilities by analyzing big data. In the phase of monitoring and vulnerability diagnosis Process, it not only detects predefined threats, but also vulnerabilities of software in each resources could promptly be applied by sharing CCE, CPE, CVE and CVSS information. This abstract proposes a model for effective detection and response of software vulnerabilities and describes effective outcomes of the model application.

The Possibility and the Way to Introduce of Venture Debt to Encourage Growth of Ventures (벤처기업의 성장 촉진을 위한 벤처부채의 가능성과 도입방안)

  • Hong, Jong Soo;Na, Sumi;Park, Jaesung James
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.4
    • /
    • pp.17-25
    • /
    • 2020
  • Venture debt is a prominent funding tool to promote scale-up of ventures. In the growth stage, venture firms that need large-scale funding can accelerate their growth by leveraging venture debt without diluting their shares, while venture capitals can quickly recollect their investments by accelerating the growth of the ventures they invest. By supplying venture debt, banks can diversify their asset primarily concentrated on loans, and improve the return on assets. As in the case of Silicon Valley Bank, a leading venture lender, closer cooperation between the two agents is essential to supply venture debt. One is the venture capital, an equity capital supplier, and the other is the bank, a debt capital supplier. To this end, we propose "credit risk sharing venture loans" and "venture loan pooling". The former encourages banks' participation in the venture debt market where the manager of Korean Fund of Funds, KVIC and policy guarantee schemes such as KODIT and KIBO screen or partially absorbe the risks inherent in venture loans. The latter reduces the burden of banking on individual venture loans through securitization.

Factors Affecting Members' Sense of Belonging in Virtual Community (가상커뮤니티에서의 구성원 소속감에 영향을 미치는 요인)

  • Lee, Kook-Yong
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.35 no.1
    • /
    • pp.19-45
    • /
    • 2010
  • Virtual Communities, which are formed on the Internet, are expected to serve the needs of members for e-collaboration, e-communication, information and knowledge sharing. The executives of organizations should consider virtual community as a new innovation or knowledge pool since members share knowledge. However, many virtual community have failed due to members' low willingness to engage and furthermore to share knowledge with other members. Thus, there is a need to understand and foster the determinants of members' sense of belonging behavior in virtual community. This study develops an integrated model designed to investigate and explain the relationships between contextual factors, personal perceptions of virtual community, usability, trust and sense of belonging in using a certain virtual community. Empirical data was collected from 201 and tested using structural equation modeling (SEM) to verify the fit of the hypothetical model. The results show that the perceived usability and community trust of members significantly influences sense of belonging in using the virtual community, and information quality, system quality, familiarity on the virtual community are significantly influence the usability but not reputation. And I confirmed that perceived shared vision and responsiveness play the role of determinants in making the member's trust, perceived risk influence the making community trust in directly. The results of the study can be used to identify the motivation underlying members' sense of belonging in a certain virtual community by investigating the impacts of contextual factors and personal perceptions on virtual community, the integrated model better explains behavior than other proposed models. This study might help executives of virtual communities and organizations to manage and promote these determinants of sense of belonging to stimulate members' willingness to engage the community and futhermore enhance their virtual community loyalty.

Partnership's Affect on Success of IT-Outsourcing (파트너십이 IT 아웃소싱의 성과에 미치는 영향)

  • Yeon, Keyong-Hwa
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.7
    • /
    • pp.171-178
    • /
    • 2007
  • In this paper the Partnership's Influence on the Success of IT-Outsourcing is studied. Especially the role of "Partnership" as Intermediate is mainly researched. As the result we can see the fact that the economic factor does not affect the Partnership and the success of IT-Outsourcing, because the IT-Outsourcing can cause sometimes the increase of the cost. On the other hand strategic factor and technical factor affect directly the Success of IT-Outsourcing. This means that the Success of IT-Outsourcing depends on the close cooperation between customer and service provider, rather than on the following the contents of the Service Level Agreement(SLA). In consequences the Partnership based on the steady and fluent communication and the feeling of sharing the risk and benefit between two parties is the key factor for the Success of IT-Outsourcing.

Development of a 4D Information based Integrated Management System for Geothermal Power Plant Drilling Project (지열발전 시추프로젝트의 4D 정보화기반 통합관리 시스템 개발)

  • Lee, Seung Soo;Kim, Kwang Yeom;Shin, Hyu-Soung
    • Tunnel and Underground Space
    • /
    • v.24 no.3
    • /
    • pp.234-242
    • /
    • 2014
  • Deep drilling project should be managed systematically and efficiently because it is significantly influenced by various related factors having uncertainty and high risk in terms of economy and effective management. In particular, drilling project involves participants from various sectors including necessary service company and it also needs their collaboration by sharing related information occurring at drilling process in order to secure efficient performance management. We developed 4D (3D + time) information based visualization system for progress management by combining 3D design model and predicted optimized control parameters for each section in geothermal well design. We also applied PDM (precedence diagramming method) to the system in order to setup the effective process model and hooked it up to 3D information based on precedence relation and required time for informatized process network.

공공연구기관의 기술이전모형연구와 그 정책적 함의 발표분야 : 기술경제, 기술정책분야(기술이전)

  • 류태규;박종복;이정동;김태유
    • Proceedings of the Technology Innovation Conference
    • /
    • 2002.06a
    • /
    • pp.203-223
    • /
    • 2002
  • In Korea, Public Research Institutes(PRIs) are today faced with the challenges of creating values by transferring technologies in store within themselves to private commercial sector. Recently, It has been increasingly pointed out that PRIs have the poor capability to valuate prospective technologies of their own, and don't run the reasonable technology transfer mechanism in terms of establishing royalty rate and initial payment, designing remuneration to inventor, screening qualified licensee, and controlling the moral hazard. This paper develops an enhanced mathematical model of technology transfer from a PRI to a private industrial firm with including the inventor as an important player. The model is made up of the main part which derives the optimal royalty rate by maximizing the social welfare and sharing risk fairly between players and some sub-parts. The one sub-part is a principal-agent model which makes it possible to control the moral hazard of inventors, and the other part provides the criteria for screening appropriate licensees. Moreover, the moral hazard between inventor and licensee is addressed by introducing the cost reduction function of efforts exerted by them. The model is able to relate the optimal royalty rate to the parameters that represent the environments under which the concerned parties operate. Especially, the ratio of initial payment over the value of transferred technology is calculated from the binding relation with the royalty rate. The paper shows that the model suggested here is more enhanced by comparing with the existing technology transfer mechanism. Finally, the paper allows us to find better strategies for effective technology transfer and further develop more sophisticated technology transfer model.

  • PDF

Study on the Security Threat Factors of Social Network Services (소셜 네트워크 서비스의 보안 위협요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.115-121
    • /
    • 2019
  • Recently, as the use of smart devices is becoming more common, various and convenient services are being developed. Among these services, the Social Network Service(SNS) is easily accessible anywhere, anytime. In particular, as well as sharing information, it forms a social relationship in cyberspace to expand new connections, and the SNS account is used as an authentication means of other services to provide users with speed and convenience at all times. However, despite the many advantages of SNS, due to security vulnerabilities occurring in the interworking process with various services, accidents of personal information are constantly occurring, and it is urgent to prepare countermeasures against potential risk factors. It is a necessary situation. Therefore, in this paper, the use of SNS is expected to increase rapidly in the future, and it is expected that it will be used as the basic data for developing the countermeasures by learning the countermeasures according to the security threats of the SNS.

A Study on CRM Practices for Public sector Insurance Companies

  • Dinesh, Reetha
    • Asia-Pacific Journal of Business
    • /
    • v.3 no.1
    • /
    • pp.39-47
    • /
    • 2012
  • Organizations pursue a CRM strategy for the purpose of increasing business performance and value. However, firms face a multitude of organizational challenges associated with this endeavor. To reduce their risk of failure, it is suggested that firms undertake a deep analysis of organizational readiness prior to committing to a CRM initiative. Insurance sector is no exception to this fact. There is an increased need to concentrate on the various challenges thrown open by the public insurance firms in implementing CRM. Many insurance firms have invested into customer driven CRM but research indicates varying outcomes (Schmith 2004). While it is clear that there are significant issues involved in the CRM implementation and success and environment faced by the public sector. It is clear that business should have an easier time in applying CRM systems is the strategic value for public sector. With customers demanding more service and accessibility from administrators, public sector CRM software technologies have to offer best solutions for achieving process and cost objectives (Souder 2001). With results which go far beyond improved service delivery and include sustained cost reductions, increased customer knowledge and better employee morale, CRM software implementation and post product environments offer great upside value. Although there are material differences in public sector use of CRM strategy, they share at least one glaring similarity - they have much to gain from proven CRM software technology. As business methods cross over in the public sector, many government bodies are investigating how they can adopt and adapt various CRM models (Bleyer 2003). There is a need to understand the similarities and differences in public sector CRM to foster shared knowledge, business processes and planning functions to integrate disparate technologies and software platforms and then, of course, the organizational culture to support knowledge sharing (Peters 1997). For the public sector, there are clearly identified CRM processes which have resulted in increased profits and improved efficiency. These have focused on sales, marketing and customer service activities, which often operate along fundamentally different lines in various public sector insurance companies. Thus the present research paper makes an attempt to explore how public sector CRM methods can be adopted and subsequently adapted.

  • PDF